Author: Jerome M. Wendt

Certainty Trumps End of Life for Technology Deployments in Edge Locations

Affordability, ease of deployment, and power and space constraints factor into product deployments at edge locations. However, some intangibles factor in more strongly with these types of deployments. Among them, organizations need certainty that they have deployed a highly available and reliable solution the provider will support.

Read More

Four Cloud-to-Cloud Data Migration Options

If you already use cloud storage to store some or all your archival or backup data, you are in good company. A recent survey of nearly 600 companies found that over 80 percent of them already use the cloud. This potentially creates a new challenge. They find their cloud storage needs change and they must migrate their data from one cloud to another.  When this infrequent situation arises, they will find four cloud-to-cloud data migration options available to them.

Read More

Five Challenges of Kubernetes Backup

Almost every enterprise in the next few years expects to introduce and adopt Kubernetes in their production environment. These same enterprises also recognize moving Kubernetes into production requires it meet the same standards as their other production platforms. Among these requirements, they must have a means to backup and recover the containerized applications they host in Kubernetes. This presents five specific backup challenges organizations should prepare to address as they host applications and data on Kubernetes.

Read More

Immutable Storage Options in a Ransomware World

Many organizations likely breathed out a small sigh of relief when REvil suddenly disappeared from the world’s ransomware stage. Allegedly responsible for attacks on Apple, meatpacker JBS SA and, most recently, Kaseya, few shed any tears over its disappearance.

Read More

Kaseya’s CEO Response to Its Current Ransomware Attack

As many are aware, Kaseya’s Virtual System Administrator (VSA) was the target of a ransomware attack over the Independence Day weekend. Two days ago, on July 6, 2021, Kaseya’s CEO, Fred Voccola, posted a video on YouTube that summarized Kaseya’s response to this attack. This blog entry contains a summary of his comments from that video. You may access the full video available through this link.

Read More

Four Critical Components of a Microsoft 365 Backup Solution

More enterprises than ever anticipate adopting Microsoft 365 online now and in the years to come. However, moving the burden of hosting Microsoft Exchange, OneDrive, SharePoint, and Teams to the Microsoft cloud can be deceiving. Microsoft still leaves the responsibility of protecting Microsoft 365 data with enterprises. In a new Competitive Intelligence report, DCIG examines four critical components a Microsoft 365 enterprise backup solution should possess. It then discusses how well the Afi SaaS Platform and Backupify deliver on them.

Read More

Four New Requirements for Modern Backup Software Solutions

All enterprises contain multiple applications, databases, operating systems, hypervisors, and data types in their data centers. As such, enterprises minimally expect any modern backup software solution to protect those items. However, protecting them only scratches the surface of the needs that enterprises expect modern backup software solutions to meet.

Read More

Upcoming Webinar Examining How to Validate Your DR Plan Against Modern Cyberthreats

Phishing, malware, ransomware, and DDoS attacks have captured the attention of organizations of all sizes across the globe. The prevalence of these attacks has forced organizations to acknowledge that it is a matter of when, not if, they experience one. Due to their likelihood of occurring, organizations must take action to prevent the attack from becoming a disaster. To discuss how organizations can best prepare, I am joining a panel that includes cybersecurity and DR representatives from Acronis on an upcoming DRJ.com webinar.

Read More

Three New Evaluation Criteria for VMware vSphere Backup Software

In the last 20 years, VMware vSphere has expanded from a nascent technology to a staple of data centers worldwide. Right alongside it, backup software that protects applications and data hosted on vSphere virtual machines (VMs) has experienced similar growth. Now as vSphere backup software enters its third decade of existence, new criteria exist for evaluating and selecting these solutions.

Read More

Click Here to Signup for the DCIG Newsletter!

Categories

DCIG Newsletter Signup

Thank you for your interest in DCIG research and analysis.

Please sign up for the free DCIG Newsletter to have new analysis delivered to your inbox each week.